. Educause, things you should know about federated identity management

. Empowerid, ws-trust and ws-federation. https

. Microsoft, understanding ws-federation. https://msdn.microsoft.com/en-us/ library/bb498017

. Oauth2, [Online ; accessed 08, 2015.

M. Abadi, M. Burrows, B. Lampson, and G. Plotkin, A calculus for access control in distributed systems, ACM Transactions on Programming Languages and Systems, vol.15, issue.4, pp.706-734, 1993.
DOI : 10.1145/155183.155225

A. Abdul-rahman and S. Hailes, Supporting trust in virtual communities, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, p.9, 2000.
DOI : 10.1109/HICSS.2000.926814

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.7883

J. Abrial, Modeling in Event-B : system and software engineering, 2010.
DOI : 10.1017/CBO9781139195881

W. J. Adams and N. J. Davis, Toward a decentralized trust-based access control system for dynamic collaboration, Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005., pp.317-324, 2005.
DOI : 10.1109/IAW.2005.1495969

URL : http://cc1.sctc.mnscu.edu/infosec/WestPointWorkshop2005/cdrom/PDFs/Papers/S14P03.pdf

A. A. Nacer, E. Goettelmann, S. Youcef, A. Tari, and C. Godart, Business Process Design by Reusing Business Process Fragments from the Cloud, 2015 IEEE 8th International Conference on Service-Oriented Computing and Applications (SOCA), p.8, 2015.
DOI : 10.1109/SOCA.2015.37

G. Ahn and R. Sandhu, language for role-based separation of duty constraints, Proceedings of the fourth ACM workshop on Role-based access control , RBAC '99, pp.43-54, 1999.
DOI : 10.1145/319171.319176

A. A. Almutairi, M. I. Sarfraz, S. Basalamah, W. G. Aref, and A. Ghafoor, A Distributed Access Control Architecture for Cloud Computing, IEEE Software, vol.29, issue.2, pp.36-44, 2011.
DOI : 10.1109/MS.2011.153

F. T. Alotaiby and J. X. Chen, A model for team-based access control, Information Technology : Coding and Computing Proceedings. ITCC 2004. International Conference on, pp.450-454, 2004.

R. Ausanka-crues, Methods for access control : advances and limitations, 2001.

R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, Persona, ACM SIGCOMM Computer Communication Review, vol.39, issue.4, pp.135-146, 2009.
DOI : 10.1145/1594977.1592585

A. K. Bandara, E. C. Lupu, and A. Russo, Using event calculus to formalise policy specification and analysis, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.26-39, 2003.
DOI : 10.1109/POLICY.2003.1206955

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.5437

E. Barka and R. Sandhu, Framework for role-based delegation models, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00), pp.168-176, 2000.
DOI : 10.1109/ACSAC.2000.898870

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.9343

E. Barka and R. Sandhu, Role-Based Delegation Model/ Hierarchical Roles (RBDM1), 20th Annual Computer Security Applications Conference, pp.396-404, 2004.
DOI : 10.1109/CSAC.2004.31

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.9381

E. Barka and R. Sandhu, A role-based delegation model and some extensions, 23rd National Information Systems Security Conference, pp.396-404, 2000.

D. E. Bell and L. J. Padula, Secure computer system : Unified exposition and multics interpretation, 1976.

M. B. Ghorbel-talbi, F. Cuppens, N. Cuppens-boulahia, and A. Bouhoula, Managing Delegation in Access Control Models, 15th International Conference on Advanced Computing and Communications (ADCOM 2007), pp.744-751, 2007.
DOI : 10.1109/ADCOM.2007.105

E. Bertino, P. A. Bonatti, and E. Ferrari, TRBAC, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, pp.191-233, 2001.
DOI : 10.1145/344287.344298

E. Bertino, B. Catania, E. Ferrari, and P. Perlasca, A logical framework for reasoning about access control models, ACM Transactions on Information and System Security, vol.6, issue.1, pp.71-127, 2003.
DOI : 10.1145/605434.605437

R. Bhatia, J. Lobo, and M. Kohli, Policy evaluation for network management, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), pp.1107-1116, 2000.
DOI : 10.1109/INFCOM.2000.832468

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.9911

K. J. Biba, Integrity considerations for secure computer systems, 1977.

A. Bielenberg, L. Helm, A. Gentilucci, D. Stefanescu, and H. Zhang, The growth of Diaspora - A decentralized online social network in the wild, 2012 Proceedings IEEE INFOCOM Workshops, pp.13-18, 2012.
DOI : 10.1109/INFCOMW.2012.6193476

E. Birrell and F. B. Schneider, Federated Identity Management Systems: A Privacy-Based Characterization, IEEE Security & Privacy, vol.11, issue.5, 2012.
DOI : 10.1109/MSP.2013.114

B. Blakley, The Emperor's old armor, Proceedings of the 1996 workshop on New security paradigms , NSPW '96, pp.2-16, 1996.
DOI : 10.1145/304851.304855

M. Blaze, J. Feigenbaum, and A. D. Keromytis, KeyNote: Trust Management for Public-Key Infrastructures, Security Protocols, pp.59-63, 1999.
DOI : 10.1007/3-540-49135-X_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.7909

M. Blaze, J. Feigenbaum, and J. Lacy, Decentralized trust management, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.164-173, 1996.
DOI : 10.1109/SECPRI.1996.502679

R. V. Boppana, H. Maynard, and J. Niu, Attribute-based access control models and implementation in cloud infrastructure as a service, 2014.

A. Bouchami, E. Goettelmann, O. Perrin, and C. Godart, Enhancing Access-Control with Risk-Metrics for Collaboration on Social Cloud-Platforms, 2015 IEEE Trustcom/BigDataSE/ISPA, pp.864-871, 2015.
DOI : 10.1109/Trustcom.2015.458

URL : https://hal.archives-ouvertes.fr/hal-01240381

A. Bouchami and O. Perrin, Access Control Framework Within a Collaborative PaaS Platform, Enterprise Interoperability VI, pp.465-476, 2014.
DOI : 10.1007/978-3-319-04948-9_39

URL : https://hal.archives-ouvertes.fr/hal-01103041

A. Bouchami, O. Perrin, and E. Zahoor, Trust-Based Formal Delegation Framework for Enterprise Social Networks, 2015 IEEE Trustcom/BigDataSE/ISPA, pp.127-134, 2015.
DOI : 10.1109/Trustcom.2015.366

URL : https://hal.archives-ouvertes.fr/hal-01240387

M. Bouguelia, Y. Belaïd, and A. Belaïd, Efficient Active Novel Class Detection for Data Stream Classification, 2014 22nd International Conference on Pattern Recognition, pp.2826-2831, 2014.
DOI : 10.1109/ICPR.2014.487

URL : https://hal.archives-ouvertes.fr/hal-01065043

M. Bouguelia, Y. Belaïd, and A. Belaïd, An adaptive streaming active learning strategy based on instance weighting, Pattern Recognition Letters, vol.70, pp.38-44, 2016.
DOI : 10.1016/j.patrec.2015.11.010

URL : https://hal.archives-ouvertes.fr/hal-01254510

D. F. Brewer and M. J. Nash, The Chinese Wall security policy, Proceedings. 1989 IEEE Symposium on Security and Privacy, pp.206-214, 1989.
DOI : 10.1109/SECPRI.1989.36295

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.8977

D. W. Britton and I. A. Brown, A security risk measurement for the radac model, 2007.

J. Bryans, Reasoning about XACML policies using CSP, Proceedings of the 2005 workshop on Secure web services , SWS '05, pp.28-35, 2005.
DOI : 10.1145/1103022.1103028

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.1935

S. Buchegger and J. Boudec, A robust reputation system for peer-to-peer and mobile ad-hoc networks, 2004.

V. Cahill, Using trust for secure collaboration in uncertain environments [48] Capterra. Top Social Networking Software Products. http://www.capterra.com/ social-networking-software, 2003.

B. Carminati, E. Ferrari, and A. Perego, Rule-Based Access Control for Social Networks, On the Move to Meaningful Internet Systems 2006 : OTM 2006 Workshops, pp.1734-1744, 2006.
DOI : 10.1007/11915072_80

B. Carminati, E. Ferrari, and A. Perego, Enforcing access control in Web-based social networks, ACM Transactions on Information and System Security, vol.13, issue.1, p.6, 2009.
DOI : 10.1145/1609956.1609962

URL : http://hdl.handle.net/11383/1706212

S. Chakraborty and I. Ray, TrustBAC, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.49-58, 2006.
DOI : 10.1145/1133058.1133067

A. K. Chandra and D. Harel, Horn clause queries and generalizations, The Journal of Logic Programming, vol.2, issue.1, pp.1-15, 1985.
DOI : 10.1016/0743-1066(85)90002-0

URL : http://doi.org/10.1016/0743-1066(85)90002-0

Y. Cheng, J. Park, and R. Sandhu, Relationship-Based Access Control for Online Social Networks: Beyond User-to-User Relationships, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, pp.646-655, 2012.
DOI : 10.1109/SocialCom-PASSAT.2012.57

D. D. Clark and D. R. Wilson, A Comparison of Commercial and Military Computer Security Policies, 1987 IEEE Symposium on Security and Privacy, pp.184-184, 1987.
DOI : 10.1109/SP.1987.10001

W. Clocksin and C. S. Mellish, Programming in PROLOG, 2003.
DOI : 10.1007/978-3-642-97596-7

M. Colombo, F. Martinelli, P. Mori, M. Petrocchi, and A. Vaccarelli, Fine Grained Access Control with Trust and Reputation Management for Globus, On the Move to Meaningful Internet Systems, pp.1505-1515, 2007.
DOI : 10.1007/978-3-540-76843-2_26

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.4495

C. Connolly, Managing privacy in identity management?the way forward

J. Crampton and H. Khambhammettu, Delegation in role-based access control, International Journal of Information Security, vol.32, issue.3, pp.123-136, 2008.
DOI : 10.1007/s10207-007-0044-8

M. L. Crossley, The desk reference of statistical quality methods, 2000.

F. Cuppens and A. Miège, Administration Model for Or-BAC, On The Move to Meaningful Internet Systems 2003 : OTM 2003 Workshops, pp.754-768, 2003.
DOI : 10.1007/978-3-540-39962-9_76

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.2905

F. Cuppens and A. Miège, Modelling contexts in the Or-BAC model, 19th Annual Computer Security Applications Conference, 2003. Proceedings., pp.416-425, 2003.
DOI : 10.1109/CSAC.2003.1254346

L. A. Cutillo, R. Molva, and T. Strufe, Safebook: A privacy-preserving online social network leveraging on real-life trust, IEEE Communications Magazine, vol.47, issue.12, pp.4794-101, 2009.
DOI : 10.1109/MCOM.2009.5350374

URL : https://hal.archives-ouvertes.fr/hal-00687143

N. Damianou, N. Dulay, E. Lupu, and M. Sloman, The Ponder Policy Specification Language, Policies for Distributed Systems and Networks, pp.18-38, 2001.
DOI : 10.1007/3-540-44569-2_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.17.4489

M. I. Daud, D. Sánchez, and A. Viejo, Ontology-Based Delegation of Access Control: An Enhancement to the XACML Delegation Profile, Trust, Privacy and Security in Digital Business, pp.18-29, 2015.
DOI : 10.1007/978-3-319-22906-5_2

C. De-laat, G. Gross, L. Gommans, J. Vollbrecht, and D. Spence, Generic aaa architecture, 2000.

Y. Demchenko, C. De-laat, L. Gommans, and R. V. Buuren, Domain Based Access Control Model for Distributed Collaborative Applications, 2006 Second IEEE International Conference on e-Science and Grid Computing (e-Science'06), pp.24-24, 2006.
DOI : 10.1109/E-SCIENCE.2006.261108

N. Dimmock, J. Bacon, D. Ingram, and K. Moody, Risk Models for Trust-Based Access Control(TBAC), Trust Management, pp.364-371, 2005.
DOI : 10.1007/11429760_25

N. Dimmock, A. Belokosztolszki, D. Eyers, J. Bacon, and K. Moody, Using trust and risk in role-based access control policies, Proceedings of the ninth ACM symposium on Access control models and technologies , SACMAT '04, pp.156-162, 2004.
DOI : 10.1145/990036.990062

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.146.1015

J. Domingo-ferrer, A Public-Key Protocol for Social Networks with Private Relationships, In Modeling Decisions for Artificial Intelligence, pp.373-379, 2007.
DOI : 10.1007/978-3-540-73729-2_35

D. R. Santos, C. M. Westphall, and C. B. , Risk-based dynamic access control for a highly scalable cloud federation, 7th International Conference on Emerging Security Information Systems and Technologies, pp.8-13, 2013.

A. A. Kalam, Modèles et politiques de sécurité pour les domaines de la santé et des affaires sociales, 2003.

A. A. Kalam and Y. Deswarte, Multi-orbac : A new access control model for distributed, heterogeneous and collaborative systems, 8th IEEE International Symposium on Systems and Information Security, 2006.

W. Ellis and D. Hersh, Xacml 3.0 analysis, 2015.

N. B. Ellison, Social network sites : Definition, history, and scholarship, Journal of Computer- Mediated Communication, vol.13, issue.1, pp.210-230, 2007.

A. B. Fadhel, D. Bianculli, and L. Briand, A comprehensive modeling framework for role-based access control policies, Journal of Systems and Software, vol.107, 2015.
DOI : 10.1016/j.jss.2015.05.015

D. Ferraiolo, D. R. Kuhn, and R. Chandramouli, Role-based access control, 2003.

B. S. Firozabadi, M. Sergot, and O. Bandmann, Using Authority Certificates to Create Management Structures, Security Protocols, pp.134-145, 2002.
DOI : 10.1007/3-540-45807-7_21

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.135.3367

K. Gaaloul, H. A. Proper, and F. Charoy, Delegation Protocols in Human-Centric Workflows, 2011 IEEE 13th Conference on Commerce and Enterprise Computing, pp.219-224, 2011.
DOI : 10.1109/CEC.2011.38

URL : https://hal.archives-ouvertes.fr/hal-00643449

M. Gaedke, J. Meinecke, and M. Nussbaumer, A modeling approach to federated identity and access management, Special interest tracks and posters of the 14th international conference on World Wide Web , WWW '05, pp.1156-1157, 2005.
DOI : 10.1145/1062745.1062916

D. Gambetta, Can we trust trust. Trust : Making and breaking cooperative relations, pp.213-237, 2000.

M. Gasser and E. Mcdermott, An architecture for practical delegation in a distributed system, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp.20-30, 1990.
DOI : 10.1109/RISP.1990.63835

C. K. Georgiadis, I. Mavridis, G. Pangalos, and R. K. Thomas, Flexible team-based access control using contexts, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.21-27, 2001.
DOI : 10.1145/373256.373259

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.9949

C. K. Georgiadis, I. Mavridis, G. Pangalos, and R. K. Thomas, Flexible team-based access control using contexts, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.21-27, 2001.
DOI : 10.1145/373256.373259

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.9949

P. D. Giang, L. X. Hung, S. Lee, Y. Lee, and H. Lee, A Flexible Trust-Based Access Control Mechanism for Security and Privacy Enhancement in Ubiquitous Systems, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07), pp.698-703, 2007.
DOI : 10.1109/MUE.2007.13

H. Gladney, Access control for large collections, ACM Transactions on Information Systems, vol.15, issue.2, pp.154-194, 1997.
DOI : 10.1145/248625.248652

E. Goettelmann, N. Mayer, and C. Godart, Integrating Security Risk Management into Business Process Management for the Cloud, 2014 IEEE 16th Conference on Business Informatics, pp.86-93, 2014.
DOI : 10.1109/CBI.2014.29

URL : https://hal.archives-ouvertes.fr/hal-01095868

L. González-manzano, A. I. González-tablas, J. M. De-fuentes, and A. Ribagorda, CooPeD: Co-owned Personal Data management, Computers & Security, vol.47, pp.41-65, 2014.
DOI : 10.1016/j.cose.2014.06.003

M. Gregg, CISSP Exam Cram 2, Que Corp, 2005.

P. Hallam-baker, Security assertions markup language, pp.1-24, 2001.

W. Han and C. Lei, A survey on policy languages in network and security management, Computer Networks, vol.56, issue.1, pp.477-489, 2012.
DOI : 10.1016/j.comnet.2011.09.014

D. Hardt, The oauth 2.0 authorization framework, 2012.
DOI : 10.17487/rfc6749

M. A. Harrison, W. L. Ruzzo, and J. D. Ullman, Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976.
DOI : 10.1145/360303.360333

V. C. Hu, D. Ferraiolo, R. Kuhn, A. Schnitzer, K. Sandlin et al., Guide to attribute based access control (abac) definition and considerations, p.162, 2014.
DOI : 10.6028/NIST.SP.800-162

V. C. Hu, D. R. Kuhn, and D. F. Ferraiolo, Attribute-Based Access Control, Computer, vol.48, issue.2, pp.85-88, 2015.
DOI : 10.1109/MC.2015.33

W. Huang and V. Atluri, SecureFlow, Proceedings of the fourth ACM workshop on Role-based access control , RBAC '99, pp.83-94, 1999.
DOI : 10.1145/319171.319179

D. Jackson, Software Abstractions : logic, language, and analysis, 2012.

S. Jajodia, P. Samarati, M. L. Sapino, and V. Subrahmanian, Flexible support for multiple access control policies, ACM Transactions on Database Systems, vol.26, issue.2, pp.214-260, 2001.
DOI : 10.1145/383891.383894

S. Jajodia, P. Samarati, and V. Subrahmanian, A logical language for expressing authorizations, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.31-42, 1997.
DOI : 10.1109/SECPRI.1997.601312

S. Jajodia, P. Samarati, and V. S. Subrahmanian, A logical language for expressing authorizations, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.31-42, 1997.
DOI : 10.1109/SECPRI.1997.601312

X. Jin, Attribute-based access control models and implementation in cloud infrastructure as a service, THE UNIVERSITY OF TEXAS AT SAN ANTONIO, 2014.

A. K. Jones, R. J. Lipton, and L. Snyder, A Linear time algorithm for deciding security, 17th Annual Symposium on Foundations of Computer Science (sfcs 1976), pp.33-41, 1976.
DOI : 10.1109/SFCS.1976.1

A. Jøsang, Trust and reputation systems In Foundations of security analysis and design IV, pp.209-245, 2007.

A. Jøsang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision. Decision support systems, pp.618-644, 2007.

J. B. Joshi and E. Bertino, Fine-grained role-based delegation in presence of the hybrid role hierarchy, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.81-90, 2006.
DOI : 10.1145/1133058.1133071

J. B. Joshi, E. Bertino, and A. Ghafoor, Temporal hierarchies and inheritance semantics for GTRBAC, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.74-83, 2002.
DOI : 10.1145/507711.507724

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.85.6080

A. Jsang and R. Ismail, The beta reputation system, Proceedings of the 15th bled electronic commerce conference, pp.41-55, 2002.

L. Kagal, T. Finin, and A. Joshi, A policy language for a pervasive computing environment, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.63-74, 2003.
DOI : 10.1109/POLICY.2003.1206958

L. Kagal, T. Finin, and Y. Peng, A delegation based model for distributed trust, Workshop on Autonomy, Delegation, and Control : Interacting with Autonomous Agents, International Joint Conferences on Artificial Intelligence, 2001.

P. Kaila, Oauth and openid 2.0. From End-to-End to Trust-to-Trust, p.18, 2008.

A. A. Kalam, R. Baida, P. Balbiani, S. Benferhat, F. Cuppens et al., Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.120-131, 2003.
DOI : 10.1109/POLICY.2003.1206966

URL : https://hal.archives-ouvertes.fr/hal-01483818

S. Kandala, R. Sandhu, and V. Bhamidipati, An Attribute Based Framework for Risk-Adaptive Access Control Models, 2011 Sixth International Conference on Availability, Reliability and Security, pp.236-241, 2011.
DOI : 10.1109/ARES.2011.41

D. E. Knuth, V. Kolovski, J. A. Hendler, and B. Parsia, Backus normal form vs. backus naur form Analyzing web access control policies, WWW, pp.735-736, 1964.
DOI : 10.1145/355588.365140

P. Konopacki, M. Frappier, and R. Laleau, Expressing Access Control Policies with an Event-Based Approach, CAiSE Workshops, pp.607-621, 2011.
DOI : 10.1007/978-3-642-00199-4_2

URL : https://hal.archives-ouvertes.fr/hal-01224638

R. Kowalski and M. Sergot, A logic-based calculus of events, Foundations of knowledge base management, pp.23-55, 1989.

D. R. Kuhn, E. J. Coyne, and T. R. Weil, Adding Attributes to Role-Based Access Control, Computer, vol.43, issue.6, pp.79-81, 2010.
DOI : 10.1109/MC.2010.155

T. Kurze, M. Klems, D. Bermbach, A. Lenk, S. Tai et al., Cloud federation, Proceedings of the 2nd International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2011), 2011.

B. W. Lampson, Protection, ACM SIGOPS Operating Systems Review, vol.8, issue.1, pp.18-24, 1974.
DOI : 10.1145/775265.775268

G. Lawton, Developing Software Online With Platform-as-a-Service Technology, Computer, vol.41, issue.6, pp.13-15, 2008.
DOI : 10.1109/MC.2008.185

A. Lazouski, F. Martinelli, and P. Mori, Usage control in computer security: A survey, Computer Science Review, vol.4, issue.2, pp.81-99, 2010.
DOI : 10.1016/j.cosrev.2010.02.002

H. Lee, I. Jeun, and H. Jung, Criteria for Evaluating the Privacy Protection Level of Identity Management Services, 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp.155-160, 2009.
DOI : 10.1109/SECURWARE.2009.31

R. Lepro, Cardea : Dynamic access control in distributed systems, System, vol.13, issue.13, pp.4-6, 2004.

H. Levesque, F. Pirri, and R. Reiter, Foundations for the situation calculus, Linköping Electronic Articles in Computer and Information Science, vol.3, issue.18, 1998.

N. Li and J. C. Mitchell, Datalog with Constraints: A Foundation for Trust Management Languages, Practical Aspects of Declarative Languages, pp.58-73, 2003.
DOI : 10.1007/3-540-36388-2_6

N. Li and J. C. Mitchell, A role-based trust-management framework, p.201, 2003.

Y. Liu, Trust-based access control for collaborative system CCCM'08, Computing, Communication, Control, and Management, pp.444-448, 2008.
DOI : 10.1109/cccm.2008.203

Z. Liu, W. Sun, and M. Alam, A flexible role-based delegation model with dynamic delegation role structure

J. Lobo, R. Bhatia, and S. A. Naqvi, A policy description language, AAAI/IAAI, pp.291-298, 1999.

J. Lu, D. Xu, L. Jin, J. Han, and H. Peng, On the complexity of role updating feasibility problem in RBAC, Information Processing Letters, vol.114, issue.11, pp.597-602, 2014.
DOI : 10.1016/j.ipl.2014.06.003

W. Luo and E. Rosen, Method and system for providing authorization, authentication, and accounting for a virtual private network, 2008.

K. Lyytinen and Y. Yoo, Ubiquitous computing, Communications of the ACM, vol.45, issue.12, pp.63-96, 2002.

M. P. Machulak, E. L. Maler, D. Catalano, and A. Van-moorsel, User-managed access to web resources, Proceedings of the 6th ACM workshop on Digital identity management, DIM '10, pp.35-44, 2010.
DOI : 10.1145/1866855.1866865

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.161.7027

E. Maler, Assertions and protocols for the oasis security assertion markup language (saml), OASIS, 2003.

M. Mankai and L. Logrippo, Access control policies : Modeling and validation, 5th NOTERE Conference (Nouvelles Technologies de la Répartition, pp.85-91, 2005.

M. Masi, R. Pugliese, and F. Tiezzi, Formalisation and Implementation of the XACML Access Control Mechanism, Engineering Secure Software and Systems, pp.60-74, 2012.
DOI : 10.1007/978-3-642-28166-2_7

N. Mayer, Model-based Management of Information System Security Risk, 2009.
URL : https://hal.archives-ouvertes.fr/tel-00402996

K. Mcnamara, Rational Fictions: Central Bank Independence and the Social Logic of Delegation, West European Politics, vol.25, issue.1, pp.47-76, 2002.
DOI : 10.1080/713601585

N. H. Minsky, The imposition of protocols over open distributed systems, IEEE Transactions on Software Engineering, vol.17, issue.2, pp.183-195, 1991.
DOI : 10.1109/32.67599

I. Molloy, L. Dickens, C. Morisset, P. Cheng, J. Lobo et al., Risk-based security decisions under uncertainty, Proceedings of the second ACM conference on Data and Application Security and Privacy, CODASKY '12, pp.157-168, 2012.
DOI : 10.1145/2133601.2133622

URL : https://hal.archives-ouvertes.fr/hal-00757539

G. Mori, F. Paternò, and C. Santoro, Ctte : support for developing and analyzing task models for interactive system design. Software Engineering, IEEE Transactions on, vol.28, issue.8, pp.797-813, 2002.

T. Moses, Extensible access control markup language (xacml) version 2.0. Oasis Standard, 2005.

E. T. Mueller, I. Thomas, J. Watson-research, . Center, and . Box, Discrete event calculus reasoner documentation. Software documentation, p.704, 2008.
DOI : 10.1016/b978-012369388-4/50070-9

E. T. Mueller, Commonsense reasoning, 2010.

E. T. Mueller, Commonsense Reasoning : An Event Calculus Based Approach, 2014.
DOI : 10.1145/1435417.1435443

L. Mui, M. Mohtashemi, and A. Halberstadt, A computational model of trust and reputation, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp.2431-2439, 2002.
DOI : 10.1109/HICSS.2002.994181

R. Nasim and S. Buchegger, XACML-Based Access Control for Decentralized Online Social Networks, 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, pp.671-676, 2014.
DOI : 10.1109/UCC.2014.108

T. N. Nguyen, K. T. Thi, A. T. Dang, H. D. Van, and T. K. Dang, Towards a Flexible Framework to Support a Generalized Extension of XACML for Spatio-temporal RBAC Model with Reasoning Ability, ICCSA (5), 2013.
DOI : 10.1007/978-3-642-39640-3_32

Q. Ni and E. Bertino, xfACL, Proceedings of the 16th ACM symposium on Access control models and technologies, SACMAT '11, pp.61-72, 2011.
DOI : 10.1145/1998441.1998451

Q. Ni, E. Bertino, and J. Lobo, Risk-based access control systems built on fuzzy inferences, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.250-260, 2010.
DOI : 10.1145/1755688.1755719

J. Park and R. Sandhu, usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-174, 2004.
DOI : 10.1145/984334.984339

J. S. Park, R. Sandhu, and G. Ahn, Role-based access control on the web, ACM Transactions on Information and System Security, vol.4, issue.1, pp.37-71, 2001.
DOI : 10.1145/383775.383777

S. Poslad, Ubiquitous computing : smart devices, environments and interactions, 2011.
DOI : 10.1002/9780470779446

S. Radack, Risk management framework : Helping organizations implement effective information security programs, INS Whitepaper, 2009.

P. Rao, D. Lin, E. Bertino, N. Li, and J. Lobo, An algebra for fine-grained integration of XACML policies, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.63-72, 2009.
DOI : 10.1145/1542207.1542218

I. Ray and M. Toahchoodee, A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications, Trust, Privacy and Security in Digital Business, pp.48-58, 2008.
DOI : 10.1007/978-3-540-85735-8_6

D. Recordon and B. Fitzpatrick, Openid authentication 2.0-final, 2007.

G. Richard, De la confiance. article paru dans la revue L'enseignement philosophique, 2000.
URL : https://hal.archives-ouvertes.fr/halshs-00153541

E. Rissanen, extensible access control markup language (xacml) version 3, 2013.

C. Ruan and V. Varadharajan, Dynamic delegation framework for role based access control in distributed data management systems. Distributed and Parallel Databases, pp.245-269, 2014.

A. Russo, R. Miller, B. Nuseibeh, and J. Kramer, An Abductive Approach for Analysing Event-Based Requirements Specifications, 2002.
DOI : 10.1007/3-540-45619-8_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.4878

J. A. Russo and R. Yates, Time limited collaborative community role delegation policy, US Patent, vol.7, p.415498, 2008.

M. B. Saidi and A. Marzouk, Multi-trust_orbac : Access control model for multi-organizational critical systems migrated to the cloud, 2013.

R. Sandhu, D. Ferraiolo, and R. Kuhn, The NIST model for role-based access control, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, 2000.
DOI : 10.1145/344287.344301

R. S. Sandhu, Expressive Power of the Schematic Protection Model*, Journal of Computer Security, vol.1, issue.1, pp.59-98, 1992.
DOI : 10.3233/JCS-1992-1104

R. S. Sandhu, Lattice-based access control models, Computer, vol.26, issue.11, pp.9-19, 1993.
DOI : 10.1109/2.241422

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.5742

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

R. S. Sandhu and P. Samarati, Access control: principle and practice, IEEE Communications Magazine, vol.32, issue.9, pp.40-48, 1994.
DOI : 10.1109/35.312842

V. Sassone, K. Krukow, and M. Nielsen, Towards a Formal Framework for Computational Trust, Formal Methods for Components and Objects, pp.175-184, 2007.
DOI : 10.1007/978-3-540-74792-5_8

L. Schwittmann, C. Boelmann, M. Wander, and T. Weis, SoNet -- Privacy and Replication in Federated Online Social Networks, 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops, pp.51-57, 2013.
DOI : 10.1109/ICDCSW.2013.20

L. Seitz, E. Rissanen, T. Sandholm, B. S. Firozabadi, and O. Mulmo, Policy administration control and delegation using XACML and Delegent, The 6th IEEE/ACM International Workshop on Grid Computing, 2005., pp.49-54, 2005.
DOI : 10.1109/GRID.2005.1542723

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.360.2520

. Lam, Prpl : a decentralized social networking infrastructure, Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services : Social Networks and Beyond, p.8, 2010.

R. A. Shaikh, K. Adi, and L. Logrippo, Dynamic risk-based decision methods for access control systems, Computers & Security, vol.31, issue.4, pp.447-464, 2012.
DOI : 10.1016/j.cose.2012.02.006

M. Shanahan, The Event Calculus Explained, Artificial intelligence today, pp.409-430, 1999.
DOI : 10.1016/S0004-3702(96)00033-1

R. Sharma and A. Datta, SuperNova: Super-peers based architecture for decentralized online social networks, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012), pp.1-10, 2012.
DOI : 10.1109/COMSNETS.2012.6151349

URL : http://arxiv.org/abs/1105.0074

S. S. Shim, G. Bhalla, and V. Pendyala, Federated identity management, Computer, vol.38, issue.12, pp.120-122, 2005.
DOI : 10.1109/MC.2005.408

W. W. Smari, P. Clemente, and J. Lalande, An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system, Future Generation Computer Systems, vol.31, pp.147-168, 2014.
DOI : 10.1016/j.future.2013.05.010

URL : https://hal.archives-ouvertes.fr/hal-00835887

W. L. Teacy, J. Patel, N. R. Jennings, and M. Luck, TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources, Autonomous Agents and Multi-Agent Systems, vol.19, issue.1, pp.183-198, 2006.
DOI : 10.1007/s10458-006-5952-x

Q. N. Thi and T. K. Dang, X-strowl : A generalized extension of xacml for context-aware spatiotemporal rbac model with owl, Digital Information Management (ICDIM), 2012 Seventh International Conference on, pp.253-258, 2012.

R. K. Thomas, Team-based access control (TMAC), Proceedings of the second ACM workshop on Role-based access control , RBAC '97, pp.13-19, 1997.
DOI : 10.1145/266741.266748

J. E. Tidswell and T. Jaeger, Integrated constraints and inheritance in DTAC, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, pp.93-102, 2000.
DOI : 10.1145/344287.344307

J. Tigli, S. Lavirotte, G. Rey, V. Hourdin, and M. , Context-aware authorization in highly dynamic environments. arXiv preprint, 2011.

H. F. Tipton and M. Krause, Information security management handbook, 2003.

K. Toumi, C. Andrés, and A. Cavalli, Trust-orBAC: A Trust Access Control Model in Multi-Organization Environments, Information Systems Security, pp.89-103, 2012.
DOI : 10.1007/978-3-642-35130-3_7

URL : https://hal.archives-ouvertes.fr/hal-00767797

H. T. Truong, A Contract-based and Trust-aware Collaboration Model, 2012.
URL : https://hal.archives-ouvertes.fr/tel-00769076

P. Tsankov, S. Marinovic, M. T. Dashti, and D. Basin, Decentralized composite access control [192] S. University of Murcia (UMU) UMU-XACML-Edito version 1.3.2, 2009.
DOI : 10.1007/978-3-642-54792-8_14

URL : http://e-collection.ethbib.ethz.ch/show?type=bericht&nr=1010

H. D. Van, T. A. Dang, and T. K. Dang, Supporting Authorization Reasoning Based on Role and Resource Hierarchies in an Ontology-Enriched XACML Model, International Journal of Computer and Communication Engineering, vol.3, issue.3, p.155, 2014.
DOI : 10.7763/IJCCE.2014.V3.311

Q. Wang and H. Jin, Quantified risk-adaptive access control for patient privacy protection in health information systems, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pp.406-410, 2011.
DOI : 10.1145/1966913.1966969

W. Wang, Team-and-role-based organizational context and access control for cooperative hypermedia environments, Proceedings of the tenth ACM Conference on Hypertext and hypermedia : returning to our diverse roots returning to our diverse roots, HYPERTEXT '99, pp.37-46, 1999.
DOI : 10.1145/294469.294480

N. Yang, H. Barringer, and N. Zhang, A purpose-based access control model, Information Assurance and Security IAS 2007. Third International Symposium on, pp.143-148, 2007.

S. S. Yau, Y. Yao, and A. B. Buduru, An adaptable distributed trust management framework for largescale secure service-based systems, Computing, issue.10, pp.96925-949, 2014.

E. Zahoor, Gouvernance de service : aspects sécurité et données, 2011.

E. Zahoor, O. Perrin, and A. Bouchami, CATT: A Cloud Based Authorization Framework with Trust and Temporal Aspects, Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.285-294, 2014.
DOI : 10.4108/icst.collaboratecom.2014.257312

URL : https://hal.archives-ouvertes.fr/hal-01103043

E. Zahoor, O. Perrin, and C. Godart, DISC: A Declarative Framework for Self-Healing Web Services Composition, 2010 IEEE International Conference on Web Services, pp.25-33, 2010.
DOI : 10.1109/ICWS.2010.70

URL : https://hal.archives-ouvertes.fr/inria-00537975

E. Zahoor, O. Perrin, and C. Godart, DISC: A Declarative Framework for Self-Healing Web Services Composition, 2010 IEEE International Conference on Web Services, 2010.
DOI : 10.1109/ICWS.2010.70

URL : https://hal.archives-ouvertes.fr/inria-00537975

E. Zahoor, O. Perrin, and C. Godart, DISC-SeT: Handling Temporal and Security Aspects in the Web Services Composition, 2010 Eighth IEEE European Conference on Web Services, pp.51-58, 2010.
DOI : 10.1109/ECOWS.2010.18

URL : https://hal.archives-ouvertes.fr/inria-00537976

E. Zahoor, O. Perrin, and C. Godart, An Event-Based Reasoning Approach to Web Services Monitoring, 2011 IEEE International Conference on Web Services, 2011.
DOI : 10.1109/ICWS.2011.97

URL : https://hal.archives-ouvertes.fr/inria-00596461

L. Zhang, G. Ahn, and B. Chu, A role-based delegation framework for healthcare information systems, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.125-134, 2002.
DOI : 10.1145/507711.507731

L. Zhang, G. Ahn, and B. Chu, A rule-based framework for role-based delegation and revocation, ACM Transactions on Information and System Security, vol.6, issue.3, pp.404-441, 2003.
DOI : 10.1145/937527.937530